Security News > 2020 > January > Hanna Andersson Data Breach: Hackers Compromise Website of Children's Clothier

Portland, Oregon-based children's clothing maker Hanna Andersson has quietly disclosed a breach to affected customers.
According to the breach notification letter, the "Incident potentially involved information submitted during the final purchase process on our website, www.hannaandersson.com, including name, shipping address, billing address, payment card number, CVV code, and expiration date." These details are often known on the dark web as 'fullz'; that is, the data contains all the information necessary for a criminal to make fraudulent purchases via the internet.
The Hannah Andersson breach has not been confirmed as a Magecart attack, but such attacks generally involve the insertion of malicious skimmer code into the victim company's payment code.
Hanna Andersson is providing no details of the attack.
"We can definitively state," says the Verizon 2019 Payment Security Report, "We have never reviewed an environment or investigated a PCI data breach involving an affected entity that was truly PCI DSS compliant." Coincidentally, this report was published at the very end of the Hanna Andersson breach.
News URL
Related news
- StreamElements discloses third-party data breach after hacker leaks data (source)
- Data breach at Japanese telecom giant NTT hits 18,000 companies (source)
- PowerSchool previously hacked in August, months before data breach (source)
- Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits (source)
- Live Ransomware Demo: See How Hackers Breach Networks and Demand a Ransom (source)
- Western Alliance Bank notifies 21,899 customers of data breach (source)
- Sperm donation giant California Cryobank warns of a data breach (source)
- Pennsylvania education union data breach hit 500,000 people (source)
- Oracle denies breach after hacker claims theft of 6 million data records (source)
- Chinese Hackers Breach Asian Telecom, Remain Undetected for Over 4 Years (source)